00:00

QUESTION 111

Which of the following is used to detect the bad sectors in a hard disk under Linux environment?

Correct Answer: A

QUESTION 112

Which of the following statements are true about UDP?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: ABE

QUESTION 113

In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entire zone file for a domain from a DNS server. The information provided by the DNS zone can help an attacker gather user names, passwords, and other valuable information. To attempt a zone transfer, an attacker must be connected to a DNS server that is the authoritative server for that zone. Besides this, an attacker can launch a Denial of Service attack against the zone's DNS servers by flooding them with a lot of requests. Which of the following tools can an attacker use to perform a DNS zone transfer?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: ABC

QUESTION 114

In which of the following IKE phases the IPsec endpoints establish parameters for a secure ISAKMP session?

Correct Answer: C

QUESTION 115

John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that the other computers on the network are also facing the same problem. John discovers that a malicious application is using the synscan tool to randomly generate IP addresses. Which of the following worms has attacked the computer?

Correct Answer: A